ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Determining Security and Efficiency of PHR Using Different Algorithms with Attribute Based Encryption in Cloud Computing

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 10)

Publication Date:

Authors : ; ;

Page : 979-983

Keywords : Security and Efficiency; PHR Algorithms; Encryption;

Source : Downloadexternal Find it from : Google Scholarexternal


A PHR is nothing but the personal health record related to the patient and patient itself is responsible for maintaining his own personal health record. A Personal Health Record service allows a patient to create, manage, and control his personal health data from one place through the web, in this patient is the PHR owner and he has full rights towords his PHR such as storing ,retrieving ,deleting ,sharing ,provide read write access to the selected users. now here is our intension is to provide security to the PHR and also determining the efficiency of different algorithms in terms of execution speed , performance and most important storage requirements. In the previous work on this topic demonstrates that we required a huge cost for maintaining specialized data centers so instead of creating data centers we are outsourced our PHR data after encryption process. In this framework we have to consider two domains first is private domain and later is public domain. Private domain consist of the people who are very close to the patient such as friend ,family members ,caregiver etc.depending on the relation with the patient ,PHR owner decides the sharing policy . another domain is the public domain which consist of the people from different category such as doctor, insurance company, medical store etc. when PHR owner outsourcing his own PHR file at that time owner of that PHR decides to whom it is shared with. For this operation we are providing separate unique ID�s to each and every category that are included in the framework. Another important flaws of existing work is single trusted agent,with this number of problems created ,as there are number of PHR owner and PHR users and when PHR is shared at that time user demand for secret key so as there are number of users so bottleneck is generated to the single trusted agent and we avoid this by using AA( Attribute Authority) by dividing the key distribution task to more than one attribute authority. Before outsourcing PHR on cloud first we have to make encryption process by using fine grained attribute based encryption . In this framework we are also providing different facilities to the PHR Owner such as Break Glass ,user revocation etc. for scalability and flexibility.

Last modified: 2016-01-11 18:11:25